0% Complete
English
صفحه اصلی
/
دوازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
نویسندگان :
Maryam Eslami
1
Mehdi Sakhaei-nia
2
1- دانشگاه بوعلی سینا
2- دانشگاه بوعلی سینا
کلمات کلیدی :
Internet of Things, Fog Computing, Service Deployment, Multiobjective Evolutionary Algorithms, Service Availability
چکیده :
Fog computing is a promising paradigm for real-time and mission-critical Internet of Things (IoT) applications. Regarding the high distribution, heterogeneity, and limitation of fog resources, applications should be placed in a distributed manner to fully utilize these resources. In this paper, we propose a linear formulation for assuring the different availability requirements of application services while maximizing the utilization of fog resources. We also compare three multiobjective evolutionary algorithms, namely MOPSO, NSGA-II, and MOEA/D for a trade-off between the mentioned optimization goals. The evaluation results in the iFogSim simulator demonstrate the efficiency of all three algorithms and a generally better behavior of MOPSO algorithm in terms of obtained objective values, application deadline satisfaction, and execution time.
لیست مقالات
لیست مقالات بایگانی شده
KGLM-QA: A Novel Approach for Knowledge Graph-Enhanced Large Language Models for Question Answering
Alireza Akhavan safaei - Pegah Saboori - Reza Ramezani - Mohammadali Nematbakhsh
تشخیص ارتباط معنایی در استکاورفلو با رمزگذار جمله جهانی
مجید دلیری - جعفر حبیبی - عیسی انامرادنژاد
A Multi Objective & Trust-Based Workflow Scheduling Method In Cloud Computing Based On The MVO Algorithm
Fatemeh Ebadifard
A Potential Solutions-Based Parallelized GA for Application Graph Mapping in Reconfigurable Hardware
Seyed Mehdi Mohtavipour - Hadi Shahriar Shahhoseini
Optimal selection of seed nodes by reducing the influence of common nodes in the influence maximization problem
Farzaneh Kazemzadeh - Ali Asghar Safaei - Mitra Mirzarezaee
SDN-based Deep Anomaly Detection For Securing Cloud Gaming Servers
Mohammadreza Ghafari - Dr Seyed Mostafa Safavi Hemami
سیستم پیشنهاددهنده غذای سالم با استفاده از داده کاوی عادت های تغذیه ای کاربران
محمد عباسی - مریم حسینی پزوه - محمدرضا شمس
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
طبقهبندی ترافیک رمز مبتنی بر یادگیری ماشین
افسانه معدنی - شقایق نادری - حسین قرایی
A High-Speed Quantum Reversible Controlled Adder/Subtractor Circuit
Negin Mashayekhi - Mohammad Reza Reshadinezhad - Shekoofeh Moghimi
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 40.3.1